General

  • Target

    NiptuneRAT-main.7z

  • Size

    59.8MB

  • Sample

    240528-lel1esea5v

  • MD5

    b0a9e59c9d88a91d61faa639f2cc8d5f

  • SHA1

    4f82c76dc2a6637f5f4575646cae4c84bbe2f62a

  • SHA256

    7aa07e1ad45026323d6a51af1a5e3e762cc4670d772e043e04d13c558b5eb0fb

  • SHA512

    592e1ff69ebbce29ef746badc494b17e8f660634a097f439c38e57a36da6701405752a55ba0e164d5a030883fb81518fc1929aed7f3a75837d742e9babad95d3

  • SSDEEP

    1572864:ipxJYt13T6VBt3bQgzw4hHnGOrb7u5sO9:S6tgVBt3bQgU4hHGOv7uWO9

Malware Config

Extracted

Family

arrowrat

Botnet

identifier

C2

IP:PORT

Mutex

mutex

Extracted

Family

njrat

Version

0.7d

Botnet

updatess

C2

updates.ydns.eu:5553

Mutex

ed17c857327d5fedde4ca40303d765dc

Attributes
  • reg_key

    ed17c857327d5fedde4ca40303d765dc

  • splitter

    |'|'|

Targets

    • Target

      NiptuneRAT-main.7z

    • Size

      59.8MB

    • MD5

      b0a9e59c9d88a91d61faa639f2cc8d5f

    • SHA1

      4f82c76dc2a6637f5f4575646cae4c84bbe2f62a

    • SHA256

      7aa07e1ad45026323d6a51af1a5e3e762cc4670d772e043e04d13c558b5eb0fb

    • SHA512

      592e1ff69ebbce29ef746badc494b17e8f660634a097f439c38e57a36da6701405752a55ba0e164d5a030883fb81518fc1929aed7f3a75837d742e9babad95d3

    • SSDEEP

      1572864:ipxJYt13T6VBt3bQgzw4hHnGOrb7u5sO9:S6tgVBt3bQgU4hHGOv7uWO9

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

JavaScript

1
T1059.007

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Tasks